Companies Home Search Profile

Advanced Techniques for Ethical Hacking

Focused View

Malcolm Shore

1:39:19

101 View
  • 01 - Enumeration is the key to pen testing success.mp4
    00:59
  • 02 - What you should know.mp4
    01:01
  • 03 - Disclaimer.mp4
    01:15
  • 01 - Introduction to enumeration.mp4
    06:22
  • 02 - A refresher on Nmap.mp4
    06:24
  • 03 - All-port scanning with Masscan.mp4
    02:57
  • 04 - Digging for gold.mp4
    03:53
  • 05 - Angry scanning.mp4
    04:21
  • 06 - Passive scanning with Shodan.mp4
    03:13
  • 01 - Using Nmap scripts.mp4
    05:31
  • 02 - Scanning with Reconnoitre.mp4
    05:16
  • 03 - Scanning with Vanquish.mp4
    07:43
  • 04 - Enumerating with Sn1per.mp4
    06:02
  • 05 - Enumerating with SPARTA.mp4
    04:22
  • 06 - Diagnosing uncommon ports.mp4
    04:46
  • 01 - What's that web server.mp4
    04:38
  • 02 - Refresher on enumerating web pages.mp4
    06:02
  • 03 - Fuzzing the website.mp4
    02:39
  • 04 - Enumerating Drupal sites.mp4
    02:30
  • 05 - Enumerating WordPress sites.mp4
    01:26
  • 06 - Enumerating Joomla sites.mp4
    01:05
  • 01 - Database enumeration with sqlmap.mp4
    05:13
  • 02 - Enumerating in the Linux shell.mp4
    05:21
  • 03 - Enumerating inside Windows.mp4
    04:41
  • 01 - What's next.mp4
    01:39
  • Description


    Once you’re proficient with basic ethical hacking techniques, you may be wondering about your next play. Advanced skills in evasion become increasingly necessary when you’re entering and operating on more complex systems. In this course, instructor Malcolm Shore shows you techniques to become a savvier penetration tester and take a big leap in your ethical hacking career.

    Explore strategies to avoid detection and minimize your footprint every step of the way—using shells, encoders, and encryptors, living off the land, and leaving no trace. Get practical tips on advanced enumeration with tools like LinPEAS, WinPEAS, and SharpUp, as well as tunneling with an SSH connection to dig deeper into networks, systems, and websites. Malcolm walks you through the steps of safely exfiltrating information, with pointers on how to escalate your privileges along the way.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 25
    • duration 1:39:19
    • Release Date 2022/12/11